CWE-1263
Improper Physical Access Control
The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.
CVE-2025-6785 (GCVE-0-2025-6785)
Vulnerability from cvelistv5
Published
2025-09-04 14:13
Modified
2025-09-11 10:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44.
References
▼ | URL | Tags |
---|---|---|
https://asrg.io/security-advisories/cve-2025-6785/ | third-party-advisory |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6785", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-04T14:23:41.236074Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-04T14:23:47.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Model 3", "vendor": "Tesla", "versions": [ { "lessThan": "2023.44", "status": "affected", "version": "2023.xx", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Netanel Saka (Plaxidityx)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle.\u0026nbsp; Testing completed on\u0026nbsp;Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5).\u0026nbsp;\u003cp\u003eThis issue affects Model 3: With software versions from 2023.Xx before 2023.44.\u003c/p\u003e" } ], "value": "Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle.\u00a0 Testing completed on\u00a0Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5).\u00a0This issue affects Model 3: With software versions from 2023.Xx before 2023.44." } ], "impacts": [ { "capecId": "CAPEC-401", "descriptions": [ { "lang": "en", "value": "CAPEC-401 Physically Hacking Hardware" } ] }, { "capecId": "CAPEC-6", "descriptions": [ { "lang": "en", "value": "CAPEC-6 Argument Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "AUTOMATIC", "Safety": "NEGLIGIBLE", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "PHYSICAL", "baseScore": 4.7, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:D/RE:L/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "LOW" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1263", "description": "CWE-1263 Improper Physical Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-11T10:54:40.950Z", "orgId": "c15abc07-96a9-4d11-a503-5d621bfe42ba", "shortName": "ASRG" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://asrg.io/security-advisories/cve-2025-6785/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Tesla Model 3 Physical CAN Bus Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c15abc07-96a9-4d11-a503-5d621bfe42ba", "assignerShortName": "ASRG", "cveId": "CVE-2025-6785", "datePublished": "2025-09-04T14:13:22.348Z", "dateReserved": "2025-06-27T12:29:05.458Z", "dateUpdated": "2025-09-11T10:54:40.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-8762 (GCVE-0-2025-8762)
Vulnerability from cvelistv5
Published
2025-08-13 06:14
Modified
2025-08-13 13:30
Severity ?
5.2 (Medium) - CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.8 (Medium) - CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.8 (Medium) - CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.319865 | vdb-entry | |
https://vuldb.com/?ctiid.319865 | signature, permissions-required | |
https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf | exploit |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8762", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-13T13:30:16.418304Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T13:30:21.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "UART Interface" ], "product": "2K+", "vendor": "INSTAR", "versions": [ { "status": "affected", "version": "3.11.1 Build 1124" } ] }, { "modules": [ "UART Interface" ], "product": "4K", "vendor": "INSTAR", "versions": [ { "status": "affected", "version": "3.11.1 Build 1124" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Imfeld (modzero AG)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Davon betroffen ist unbekannter Code der Komponente UART Interface. Durch das Manipulieren mit unbekannten Daten kann eine improper physical access control-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1263", "description": "Improper Physical Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-13T06:14:04.487Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-319865 | INSTAR 2K+/4K UART improper physical access control", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.319865" }, { "name": "VDB-319865 | CTI Indicators (IOB, IOC)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.319865" }, { "tags": [ "exploit" ], "url": "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf" } ], "timeline": [ { "lang": "en", "time": "2025-08-13T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-13T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-13T08:18:26.000Z", "value": "VulDB entry last update" } ], "title": "INSTAR 2K+/4K UART improper physical access control" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-8762", "datePublished": "2025-08-13T06:14:04.487Z", "dateReserved": "2025-08-08T15:37:37.719Z", "dateUpdated": "2025-08-13T13:30:21.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Specific protection requirements depend strongly on contextual factors including the level of acceptable risk associated with compromise to the product's protection mechanism. Designers could incorporate anti-tampering measures that protect against or detect when the product has been tampered with.
Mitigation
Phase: Testing
Description:
- The testing phase of the lifecycle should establish a method for determining whether the protection mechanism is sufficient to prevent unauthorized access.
Mitigation
Phase: Manufacturing
Description:
- Ensure that all protection mechanisms are fully activated at the time of manufacturing and distribution.
CAPEC-401: Physically Hacking Hardware
An adversary exploits a weakness in access control to gain access to currently installed hardware and precedes to implement changes or secretly replace a hardware component which undermines the system's integrity for the purpose of carrying out an attack.